← All reports
PDF Excel ReqIF

Air Traffic Control System

System Requirements Specification (SyRS) — ISO/IEC/IEEE 15289 — Specification | IEEE 29148 §6.2–6.4
Generated 2026-03-27 — UHT Journal / universalhex.org

Referenced Standards

StandardTitle
IEC 61508 Functional safety of electrical/electronic/programmable electronic safety-related systems
IEC 62061 Safety of machinery — Functional safety of safety-related control systems

Acronyms & Abbreviations

AcronymExpansion
ARC Architecture Decisions
CAA Civil Aviation Authority
CCCS Completeness, Consistency, Correctness, Stability
EARS Easy Approach to Requirements Syntax
IFC Interface Requirements
LRU Replaceable Unit
MSAW Minimum Safe Altitude Warning
MTCD Term Conflict Detection
NATS Air Navigation Service Provider
PSR Primary Surveillance Radar
SSR Secondary Surveillance Radar
STCA Term Conflict Alert
STK Stakeholder Requirements
SUB Subsystem Requirements
SYS System Requirements
UHT Universal Hex Taxonomy
VER Verification Plan

Stakeholder Requirements (STK)

RefRequirementV&VTags
STK-REQ-001 The Air Traffic Control System SHALL enable controllers to maintain safe separation between all aircraft within controlled airspace in accordance with ICAO Doc 4444 separation minima.
Rationale: The primary purpose of ATC is separation assurance. ICAO Doc 4444 defines the applicable separation minima (5 NM en-route, 3 NM terminal). Controllers need a system that presents accurate traffic information and provides tools to ensure these minima are never breached. Failure to maintain separation is the most severe safety outcome in ATC operations.
Demonstration stakeholder, session-323
STK-REQ-002 The Air Traffic Control System SHALL provide continuous 24/7 operational availability with no single point of failure that could cause loss of air traffic service.
Rationale: Air Navigation Service Providers (ANSPs) are mandated by ICAO Annex 11 to provide continuous ATC service in designated airspace. Any service interruption requires emergency procedures, airspace closure, or traffic flow restrictions that create cascading delays and safety risk. The system must be architected for zero unplanned downtime.
Analysis stakeholder, session-323
STK-REQ-003 The Air Traffic Control System SHALL achieve a safety integrity level commensurate with EUROCONTROL ESARR 4 severity classification, targeting a maximum tolerable probability of 1.55x10^-8 per flight hour for ATM system failures that could lead to an accident.
Rationale: European regulators require ATM systems to meet ESARR 4 safety targets. The 1.55x10^-8 figure is the EUROCONTROL Target Level of Safety for the most severe failure condition (accident with no effective recovery). This drives the entire system architecture toward redundancy, diversity, and rigorous verification. National CAA certification requires evidence of compliance.
Analysis stakeholder, session-323
STK-REQ-004 The Air Traffic Control System SHALL present surveillance and flight data in a manner that minimises controller cognitive workload while supporting a sector capacity of at least 40 aircraft simultaneously.
Rationale: Controller workload is a primary constraint on sector capacity and a contributor to operational errors. European ATM performance targets require sector throughput of 40+ aircraft. The system must support this through clear displays, appropriate automation, and efficient interaction design. Excessive clutter, latent alerts, or poor HMI design directly increases error probability.
Demonstration stakeholder, session-323
STK-REQ-005 The Air Traffic Control System SHALL support automated coordination and seamless handoff of flights with adjacent ATC centres using OLDI (On-Line Data Interchange) messaging in accordance with EUROCONTROL specification.
Rationale: Airlines and passengers expect seamless en-route transitions. Manual telephone coordination between centres is slow, error-prone, and limits sector capacity. OLDI automation enables predictive coordination (ABI, ACT, MAC messages), reducing controller workload during handoffs and preventing coordination errors that have historically contributed to mid-air collision risk at sector boundaries.
Test stakeholder, session-323
STK-REQ-006 The Air Traffic Control System SHALL support a maximum sector capacity of at least 60 movements per hour per sector, with controller workload tools (conflict probe, sequencing) available to sustain flow rates up to that ceiling.
Rationale: Air Navigation Service Provider (NATS): ANSP throughput targets are agreed with the CAA and airport operators; failure to support 60 movements/hr per sector limits FIR capacity and forces flow restrictions impacting airlines.
Demonstration stakeholder, stk-ansp, session-384, idempotency:stk-ansp-capacity-384
STK-REQ-007 The Air Traffic Control System SHALL maintain all audit logs and recordings in a tamper-evident format accessible to the Civil Aviation Authority (CAA) within 2 hours of a formal incident investigation request.
Rationale: UK CAA (Civil Aviation Authority): regulator has statutory rights to access ATC recordings under Air Navigation Order 2016; non-compliance risks operational licence suspension. 2h access SLA is the CAA's stated investigation enablement requirement.
Demonstration stakeholder, stk-caa, session-384, idempotency:stk-caa-audit-access-384
STK-REQ-008 The Air Traffic Control System SHALL provide a maintenance interface that allows trained technicians to replace any line-replaceable unit (LRU) without interrupting ATC operations, with restoration of the replaced LRU to full operational status within 30 minutes.
Rationale: Maintenance engineering team: LRU replacement downtime drives service credit penalties with the ANSP; 30-minute MTTR is the contractual target for field maintenance. Non-interrupting LRU swap is required because the ATCS runs 24/7 with no maintenance windows.
Demonstration stakeholder, stk-maintenance, session-384, idempotency:stk-maintenance-lru-384
STK-REQ-009 The Air Traffic Control System SHALL provide full ASTERIX Cat 062 track output to all registered third-party systems (flow management, adjacent ATC centres) with latency not exceeding 500ms from the track update generation time.
Rationale: Adjacent ATC centre operators and EUROCONTROL CFMU: ASTERIX Cat 062 is the mandated track data exchange format (EUROCONTROL ASTERIX specification); 500ms latency is required for CFMU to compute accurate flow control predictions.
Test stakeholder, stk-adjacent-atc, session-384, idempotency:stk-adjacent-asterix-384
STK-REQ-010 The Air Traffic Control System SHALL provide an isolated controller training mode that replicates the live operational interface with recorded or synthetic traffic, preventing any training-mode inputs from entering the live operational system, so that controllers may maintain proficiency and assess system changes without flight safety risk.
Rationale: ICAO Doc 9426 ATC Planning Manual and EUROCONTROL guidelines require ATCS training mode to be physically or logically isolated from live operations. Proficiency validation in a live system poses unacceptable risk; an incorrectly entered instruction during a training exercise could be transmitted to aircraft. Inspection of isolation architecture (separate processing, no live data write-back) plus a demonstration test confirms segregation.
Inspection mode-coverage, training-mode, validation-gap, session-543, idempotency:stk-training-mode-session-543

System Requirements (SYS)

RefRequirementV&VTags
SYS-012 The Air Traffic Control System SHALL provide real-time ASTERIX Category 062 System Track output to all registered third-party consumers (adjacent ATC centres, CFMU, flow management systems) with a maximum end-to-end latency of 500ms from track update generation to network delivery, with zero message loss for registered consumers over any 24-hour period.
Rationale: Derived from STK-REQ-009: adjacent ATC centres and CFMU flow management require ASTERIX Cat 062 data within the 500ms CFMU SLA to generate accurate flow control predictions. Message loss would create track data gaps in downstream systems that rely on the track feed for automated coordination, creating coordination hazards at sector boundaries.
Test idempotency:sys-req-asterix-cat062-latency
SYS-REQ-001 The Air Traffic Control System SHALL maintain a multi-sensor fused track position accuracy of less than 250 metres RMS for en-route surveillance and less than 50 metres RMS for terminal area surveillance.
Rationale: Separation minima of 5 NM en-route and 3 NM terminal require track accuracy significantly better than the separation standard to allow controllers to detect converging tracks with adequate warning. 250m en-route corresponds to approximately 2.7% of 5 NM separation, providing sufficient margin for controller assessment. Terminal 50m accuracy is driven by parallel runway approach monitoring where aircraft may be separated by only 1000ft laterally.
Test system, surveillance, session-323
SYS-REQ-002 The Air Traffic Control System SHALL update the surveillance track picture at a rate of at least once per 4 seconds for en-route and once per 1 second for terminal approach operations.
Rationale: Track update rate determines controller ability to detect developing conflicts. 4-second en-route rate matches the rotation period of long-range SSR and provides adequate track refresh for traffic at Mach 0.80-0.85. Terminal 1-second rate is required for approach monitoring where aircraft closure rates on final approach are high and controller reaction time is limited.
Test system, surveillance, session-323
SYS-REQ-003 The Air Traffic Control System SHALL achieve operational availability of at least 99.9997% measured over any 12-month period, corresponding to no more than 1.6 minutes of unplanned downtime per year.
Rationale: ANSP continuity obligation requires effectively zero unplanned outage. 99.9997% (five-and-a-half nines) corresponds to 1.6 min/year, which allows for one brief automatic failover event. This drives dual-redundant hot-standby architecture with sub-5-second switchover. Each additional nine of availability roughly doubles the system cost, and 99.9997% represents the engineering optimum for ATC where the cost of an outage (airspace closure, diversion costs, safety risk) vastly exceeds redundancy investment.
Analysis system, availability, session-323
SYS-REQ-004 The Air Traffic Control System SHALL detect and alert controllers to predicted losses of separation at least 120 seconds before the predicted closest point of approach, with a missed detection probability not exceeding 10^-5 per conflict encounter.
Rationale: 120 seconds provides adequate time for controller assessment, pilot communication, and execution of a resolution manoeuvre. At closing speeds of 1000 kt (head-on en-route), 120 seconds corresponds to approximately 33 NM from the conflict point. The 10^-5 missed detection rate is derived from ESARR 4 safety target apportionment: the safety net is the last barrier before a mid-air collision, and its reliability must ensure the overall accident rate stays below 1.55x10^-8.
Test system, safety-net, session-323
SYS-REQ-005 The Air Traffic Control System SHALL simultaneously process and display at least 2500 correlated surveillance tracks and 5000 active flight plans without degradation of display refresh rate or processing latency.
Rationale: Sector capacity of 40 aircraft per sector, across a centre with up to 25 sectors plus overflights and adjacent traffic, requires a system-wide capacity of 2500+ tracks. Flight plan count is higher because plans are filed hours before activation. The system must maintain full performance at peak loading — capacity-related performance degradation would force sector capacity restrictions during periods of highest demand.
Test system, capacity, session-323
SYS-REQ-006 The Air Traffic Control System SHALL implement network isolation between the operational ATC network and all external networks (internet, airline networks, meteorological feeds), with all external data feeds ingested through unidirectional data diodes or validated application-layer gateways.
Rationale: ATC systems are designated Critical National Infrastructure in all ICAO Contracting States. Network isolation is a mandatory cyber security control per ICAO Doc 10110 (Cyber Security Manual for Civil Aviation) and EUROCONTROL's EATM-CERT guidance. Unidirectional data diodes for external feeds eliminate the attack surface from airline networks and internet-connected met services without disrupting data ingestion — a hardware-enforced boundary cannot be compromised by software vulnerabilities.
Analysis system, cybersecurity, session-379
SYS-REQ-007 The Air Traffic Control System SHALL be supplied by at least two independent power sources (mains grid plus diesel generator), with automatic switchover to backup within 500 ms on mains failure and a minimum 72-hour backup power endurance at full operational load.
Rationale: Power failure is identified as a Common Mode Failure that could disable all ATC services simultaneously. ICAO Annex 10 and EUROCONTROL ESARR 2 require continuous power supply for ATC facilities. 72-hour endurance is derived from the maximum credible grid outage scenario (major storm or regional grid fault) that must not force airspace closure. 500ms switchover prevents UPS battery exhaustion during mains interruption.
Test system, power, session-379
SYS-REQ-008 The Air Traffic Control System SHALL provide a controller-initiated conflict probe tool that scans all active flight plans against current airspace structure and generates a preliminary conflict notification at least 20 minutes before predicted intersection.
Rationale: Medium-Term Conflict Detection (MTCD) is required by EUROCONTROL ATM Master Plan Phase 2 to support high-density operations; 20-minute horizon gives controllers adequate time to negotiate reroutings before separation minima are threatened.
Test system, safety, session-384, idempotency:sys-mtcd-conflict-probe-384
SYS-REQ-009 The Air Traffic Control System SHALL continue to provide surveillance display, flight data display, and voice communications at degraded but safe minimum service levels following any single subsystem failure, with recovery to full service within 15 minutes.
Rationale: Minimum service level following single subsystem failure is the safety case baseline for system availability architecture; 15-minute recovery is the NATS Target Level of Safety (TLS) for ATC system failure modes, derived from separation assurance temporal buffers.
Test system, availability, degraded, session-384, idempotency:sys-degraded-service-384
SYS-REQ-010 The Air Traffic Control System SHALL interface to the EUROCONTROL CFMU Network Manager via the OLDI B2B web service interface, exchanging flight plan activation, modification, and flight data for all flights within the FIR at update rates consistent with the CFMU SLA.
Rationale: CFMU interface is a mandatory EUROCONTROL Network Manager requirement for all IFR flights; failure to maintain the B2B interface results in CFMU flow restrictions affecting all aircraft transiting the FIR.
Test system, interface, session-384, idempotency:sys-cfmu-interface-384
SYS-REQ-011 The Air Traffic Control System SHALL record all surveillance tracks, controller-pilot voice communications, controller inputs, and flight data events in tamper-evident format, retained for a minimum of 30 days and retrievable within 2 hours of a regulatory request.
Rationale: UK CAA CAP 670 and ICAO Annex 11 Section 6.4 mandate ATC recording for incident investigation; 30-day retention and 2h retrieval are the CAA's specified investigation enablement requirements. Tamper-evidence is required for legal admissibility.
Test system, recording, regulatory, session-384, idempotency:sys-recording-mandate-384
SYS-REQ-013 The Air Traffic Control System SHALL provide a maintenance interface that permits replacement of any Line-Replaceable Unit (LRU) without interrupting active ATC service, with full subsystem functionality restored within 30 minutes of LRU insertion.
Rationale: STK-REQ-008 requires LRU replacement without service interruption and 30-minute restoration. SYS-REQ-009 covers degraded mode continuity but does not address the maintenance procedure protocol or restoration time bound. The 30-minute target is derived from ICAO Doc 7030 ATC service continuity expectations.
Test idempotency:sys-maintenance-lru-swap-session-539
SYS-REQ-014 The Air Traffic Control System SHALL implement a training mode subsystem that is logically isolated from the operational data path, sharing no write-back channel to live tracking, flight plan, or voice systems, and that replays recorded traffic or injects synthetic traffic at the Controller Working Position.
Rationale: Derived from REQ-SEAIRTRAFFICCONTROL-082 (training mode isolation). The isolation boundary must be at the system architecture level to prevent accidental live system writes. The training subsystem replay capability is necessary for regulatory proficiency requirements under CAA ATC licensing standards.
Inspection mode-coverage, training-mode, session-543, idempotency:sys-training-mode-session-543

Requirements by Category (IEEE 29148)

5
Functional Requirements
11
Performance Requirements
2
Interface Requirements
1
Security Requirements
2
Reliability & Availability
2
Compliance & Regulatory

Traceability Matrix — STK to SYS

SourceTargetTypeDescription
STK-REQ-008 SYS-REQ-013 derives STK-008 maintenance LRU requirement derives SYS-013 maintenance interface and restoration time bound
STK-REQ-009 SYS-012 derives STK-REQ-009 ASTERIX Cat 062 ≤500ms latency requirement derives the system-level ASTERIX output specification SYS-012
STK-REQ-008 SYS-REQ-009 derives STK-REQ-008 LRU replacement MTTR constraint derives the 15-minute service restoration requirement in SYS-REQ-009
STK-REQ-007 SYS-REQ-011 derives Audit log requirement drives recording requirement
STK-REQ-006 SYS-REQ-005 derives Sector capacity drives 400-aircraft processing requirement
STK-REQ-005 SYS-REQ-010 derives Coordination drives CFMU NMOC interface requirement
STK-REQ-004 SYS-REQ-002 derives Display clarity drives surveillance update rate
STK-REQ-003 SYS-REQ-006 derives SIL requirement drives network isolation
STK-REQ-002 SYS-REQ-003 derives 24/7 availability drives 99.9997% availability requirement
STK-REQ-001 SYS-REQ-004 derives Safety separation drives STCA detection requirement
STK-REQ-001 SYS-REQ-001 derives Safety separation drives track accuracy requirement
STK-REQ-007 SYS-REQ-011 derives CAA audit access requirement drives system recording mandate
STK-REQ-003 SYS-REQ-003 derives Safety integrity level need drives system availability requirement
STK-REQ-001 SYS-REQ-004 derives Controller separation need drives system STCA requirement
STK-REQ-005 SYS-REQ-010 derives Automated coordination need drives CFMU B2B interface requirement
STK-REQ-002 SYS-REQ-009 derives 24/7 availability need derives degraded service requirement
STK-REQ-006 SYS-REQ-008 derives ANSP capacity need derives system conflict probe requirement
STK-REQ-002 SYS-REQ-003 derives Continuous availability drives 99.9997% system availability target
STK-REQ-001 SYS-REQ-004 derives Separation assurance drives automated conflict detection
STK-REQ-001 SYS-REQ-001 derives Separation assurance drives track accuracy requirement
STK-REQ-002 SYS-REQ-007 derives 24/7 availability need drives redundant power supply requirement
STK-REQ-003 SYS-REQ-006 derives Safety integrity target drives network isolation requirement
STK-REQ-004 SYS-REQ-005 derives Controller workload and sector capacity need drives system processing capacity
STK-REQ-003 SYS-REQ-004 derives ESARR 4 safety target drives conflict alert missed detection probability
STK-REQ-001 SYS-REQ-004 derives Separation assurance need drives conflict alert timing and reliability
STK-REQ-002 SYS-REQ-003 derives 24/7 continuity need drives 99.9997% availability target
STK-REQ-001 SYS-REQ-002 derives Separation assurance need drives track update rate requirement
STK-REQ-001 SYS-REQ-001 derives Separation assurance need drives track position accuracy requirement